Tag: CIA

  • Hackers expose defence and intelligence officials in US and UK

    Hackers expose defence and intelligence officials in US and UK

    Security breach by ‘hacktivists’ reveals email addresses of 221 British military staff and 242 Nato officials

    Ed Pilkington in New York and Richard Norton-Taylor

    NATO Secretary General Anders Fogh Rasmussen
    Nato secretary general Anders Fogh Rasmussen. More than 200 of his staff have been exposed by Anonymous 'hacktivists'. Photograph: Olivier Hoslet/EPA

    Thousands of British email addresses and encrypted passwords, including those of defence, intelligence and police officials as well as politicians and Nato advisers, have been revealed on the internet following a security breach by hackers.

    Among the huge database of private information exposed by self-styled “hacktivists” are the details of 221 British military officials and 242 Nato staff. Civil servants working at the heart of the UK government – including several in the Cabinet Office as well as advisers to the Joint Intelligence Organisation, which acts as the prime minister’s eyes and ears on sensitive information – have also been exposed.

    The hackers, who are believed to be part of the Anonymous group, gained unauthorised access over Christmas to the account information of Stratfor, a consultancy based in Texas that specialises in foreign affairs and security issues. The database had recorded in spreadsheets the user IDs – usually email addresses – and encrypted passwords of about 850,000 individuals who had subscribed to Stratfor’s website.

    Some 75,000 paying subscribers also had their credit card numbers and addresses exposed, including 462 UK accounts.

    John Bumgarner, an expert in cyber-security at the US Cyber Consequences Unit, a research body in Washington, has analysed the Stratfor breach for the Guardian. He has identified within the data posted by the hackers the details of hundreds of UK government officials, some of whom work in sensitive areas.

    Many of the email addresses are not routinely made public, and the passwords are all encrypted in code that can quickly be cracked using off-the-shelf software.

    Among the leaked email addresses are those of 221 Ministry of Defence officials identified by Bumgarner, including army and air force personnel. Details of a much larger group of US military personnel were leaked. The database has some 19,000 email addresses ending in the .mil domain of the US military.

    In the US case, Bumgarner has found, 173 individuals deployed in Afghanistan and 170 in Iraq can be identified. Personal data from former vice-president Dan Quayle and former secretary of state Henry Kissinger were also released.

    Other UK government departments have been affected: seven officials in the Cabinet Office have had their details exposed, 45 Foreign Office officials, 14 from the Home Office, 67 Scotland Yard and other police officials, and two employees with the royal household.

    There are also 23 people listed who work in the houses of parliament, including Jeremy Corbyn, Labour MP for Islington North, Lady Nicholson and Lord Roper. Corbyn said he had been unaware of the breach, adding that although his email address was public he was disturbed by the idea that his password could be cracked and used to delete or write emails in a way that “could be very damaging”.

    Nicholson, speaking on a phone from Iraq, said she had no idea that her personal information had been hacked. She said she was very unhappy that private individuals had had their fundamental right to privacy violated. “To expose civil servants is monstrously unfair,” she said. “Officials in sensitive areas like defence and the military could even be exposed to threats. Guarding data like this is extremely difficult, but it’s not impossible, and we should do a great deal more.”

    The hacking has had a big impact because Stratfor offers expert analysis of international affairs, including security issues, and attracts subscribers from sensitive government departments.

    The British victims include officials with the Joint Intelligence Organisation (JIO) responsible for assessing intelligence from all sources, including MI6 secret agents.

    A former deputy head of Whitehall’s strategic horizons unit is listed. The unit is part of the JIO based in the Cabinet Officeand was set up four years ago to give early warning of potential serious problems that might have an impact on Britain’s security or environment.

    The extent of the security risk posed by the breach is not known. Bumgarner said officials who did not take extra precautions in securing passwords through dual authentication or other protection systems could find email and other databases they use being compromised. “Any foreign intelligence service targeting Britain could find these emails useful in identifying individuals connected to sensitive government activities,” he said.

    British officials, speaking on condition of anonymity, said they were aware of the hacking but it did not pose a risk to national security. Passwords for their communications within Whitehall would be different from any used to access the Stratfor sites. Whitehall communications would also be protected by extra security walls, officials said.

    However, they added that their personal communications could be at risk if individuals used the same password as they used to access Stratfor for their bank accounts and other personal communications.

    A government spokesman said: “We are aware that subscriber details for the Stratfor website have been published in the public domain. At present, there is no indication of any threat to UK government systems. Advice and guidance on such threats is issued to government departments through the Government Computer Emergency Response Team.”

    Stratfor has taken down its website while it investigates the security breach. The company says it is “working diligently to prevent it from ever happening again”.

    This is just the latest action to hit the headlines by hackers associated with Anonymous. The group, whose loose collection of members are scattered around the world and linked through internet chatrooms, has previously targeted Visa, MasterCard and PayPal in protest at the companies’ refusal to accept donations for the WikiLeaks website.

    www.guardian.co.uk, 8 January 2012

  • George Tenet Faces Indictment For Pre-9/11 Coverup

    George Tenet Faces Indictment For Pre-9/11 Coverup

    George TenetIn recordings released yesterday and earlier in August, Richard Clarke, the former White House Director of Counter-Terrorism alleges that top CIA officials including George Tenet intentionally withheld crucial intelligence from the FBI concerning known Al Qaeda operatives in the US before September 11 which could have possibly prevented the attacks.

    This is only the most recent reason to immediately indict Tenet as he is also proven to have lied before the joint congressional inquiry after 9/11 by stating that he did not meet with Ex-President Bush in August of 2001 when CIA records later proved that they met twice; once in Crawford, Texas on August 17th and again in Washington on August 31.

    The identities of other officials involved in the coverup include Alfreda Frances Bikowsky, the current Director of the CIA Global Jihad Unit, CTC Director J. Cofer Black and Richard Blee of Alec Station.

    Holding a top U.S.A. intelligence position does not give anyone the right to purger themselves in congressional hearings.  These actions classify as obstruction of justice and need to be brought to national attention and courts immediately.

    Sources:  CSPAN | George Tenet Lied Before The 9/11 Commission | www.youtube.com/watch?v=BF_Y4oRsDqE

    www.secrecykills.com

    www.boilingfrogspost.com/2011/09/21/bfp-breaking-news-confirmed-identity-of-the-cia-official-behind-911-rendition-torture-cases-is-revealed/

     

  • U.S. Ambassador to Syria in charge of recruiting Arab/Muslim death squads

    U.S. Ambassador to Syria in charge of recruiting Arab/Muslim death squads

    ROBERT FORD
    Robert Ford, US Ambassador to Syria

    by Wayne Madsen

    WMR has been informed by reliable sources that the U.S. ambassador to Syria, Robert S. Ford, is the key State Department official who has been responsible for recruiting Arab “death squads” from Al Qaeda-affiliated units in Afghanistan, Iraq, Yemen, and Chechnya to fight against Syrian military and police forces in embattled Syria. Ford served as the Political Officer at the U.S. embassy in Baghdad from 2004 to 2006 under Ambassador John Negroponte, the U.S. ambassador to Honduras from 1981 to 1985. Negroponte was a key figure in the covert U.S. program to arm the Nicaraguan contras and his support for vicious paramilitary units in El Salvador and Honduras earned him the nickname of “Mr. Death Squad.”

    Negroponte tasked Ford with implementing the “El Salvador option” in Iraq, the use of Iraqi Shi’a irregulars and Kurdish Pesh Merga paramilitary forces to target for assassination and kidnapping/torture Iraqi insurgency leaders in Iraq and across the border in Syria. The operation was named for Negroponte’s death squad operation in Central America in the 1980s.

    Ford has become the point man in the recruitment of Arabs and Muslims from the Middle Eastand beyond to battle against the security forces loyal to Syrian President Bashar Assad. The U.S.-backed terrorists have not only carried out attacks on Syrian security forces but have also massacred civilians in “false flag” operations later blamed on Syrian government forces. WMR has been informed that Ford’s operations in Syria are being carried out with the assistance of Israel’s Mossad.

    The “El Salvador” option has also been used in Libya, where Al Qaeda irregulars, drawn from Iraq, Afghanistan, and Yemen, have been carrying out murders of Libyan civilians, especially black Libyans and African guest workers, on behalf of the Libyan rebel government. Some of the murders of civilians have been blamed on pro-Muammar Qaddafi forces but they have, in fact, been carried out by Al Qaeda units fighting with the rebels and which are being directed by CIA and MI-6 advisers. Ford has been providing advice to the Libyan rebels on how to carry out their death squad attacks.

    From 2006 to 2008, Ford served as U.S. ambassador to Algeria, a nation that opposes the Libyan rebel government and a nation that has begun to see a re-surgence of “Al Qaeda” terrorist attacks against Algerian government targets. In fact, Algeria is viewed as the next domino to fall as the U.S. seeks to establish total military and political hegemony over North Africa.

    WMR has learned from a source who was recently in Libya that the Libyan rebel transitional government has agreed to allow the U.S. to establish permanent military bases in Libya, including on the Algerian border. The rebels have also agreed to permit an American to serve as the chief political officer for the planned Libyan transitional advisory body due to be organized by NATO and the United Nations. The body will be modeled on the Coalition Provisional Authority in Iraq.

    www.opinion-maker.org, 12. Sep, 2011

  • Secret Libyan files claim MI6 and the CIA aided human rights violations

    Secret Libyan files claim MI6 and the CIA aided human rights violations

    Intelligence helped Gaddafi regime track and apprehend dissidents, according to files seized from Tripoli offices

    Cherry Wilson

    Muammar Gaddafi
    Files found in Tripoli offices claim MI6 and the CIA were complicit in human rights violations by the Gaddafi regime. Photograph: Alessandro Bianchi/Reuters

    British and US intelligence agencies built up close links with Muammar Gaddafi and handed over detailed information to assist his regime, according to secret files found in Libyan government offices.

    The documents claim that MI6 supplied its counterparts in Libya with details on exiled opponents living in the UK, and chart how the CIA abducted several suspected militants before handing them over to Tripoli.

    They also contain communications between British and Libyan security officials ahead of Tony Blair’s visit in 2004, and show that British officials helped write a draft speech for Gaddafi when he was being encouraged to give up his weapons programme.

    The discovery was made by reporters and members of Human Rights Watch in the private offices of Moussa Koussa, the former foreign minister and head of Libyan intelligence, who defected to Britain in February. He is now believed to be in Qatar.

    According to the documents, Libya’s relationship with MI6 and the CIA was especially close between 2002 and 2004, at the height of the war on terror. The papers give details of how No 10 insisted that the 2004 meeting between Blair and Gaddafi took place in his bedouin tent, with a letter from an MI6 official saying: “I don’t know why the English are fascinated by tents. The plain fact is that the journalists would love it.”

    They also show how a statement made by Gaddafi during the time in which he pledged to give up his nuclear programme and destroy his stock of chemical and biological weapons was put together with the help of British officials. A covering letter states: “For the sake of clarity, please find attached a tidied-up version of the language we agreed on Tuesday. I wanted to ensure that you had the same script.”

    Other letters seem to reveal that British intelligence gave Tripoli details of a Libyan dissident who had been freed from jail in Britain. One US document stated the CIA was in a position to deliver a prisoner into the custody of Libyan authorities.

    The papers, which have not been independently verified, also suggest the CIA abducted several suspected militants from 2002 to 2004 who were subsequently handed over to Tripoli. Human Rights Watch has accused the CIA of condoning torture.

    “It wasn’t just abducting suspected Islamic militants and handing them over to the Libyan intelligence,” said Peter Bouckaert, director of Human Rights Watch’s emergencies division. “The CIA also sent the questions they wanted Libyan intelligence to ask and, from the files, it’s very clear they were present in some of the interrogations themselves.”

    Foreign secretary, William Hague, said he could not comment on security matters. Further documents found at the British ambassador’s residence in Tripoli, and obtained by a Sunday newspaper, concerned the release of Lockerbie bomber Abdelbaset al-Megrahi. A memo written in January 2009 by Robert Dixon, head of the North Africa team at the Foreign Office, and sent to then foreign secretary David Miliband, warned that Gaddafi’s ministers said there would be “dire consequences” for the UK-Libya relationship in the event of Megrahi’s death in custody.

    www.guardian.co.uk, 3 September 2011

  • Hackers steal SSL certificates for CIA, MI6, Mossad

    Hackers steal SSL certificates for CIA, MI6, Mossad

    Criminals acquired over 500 DigiNotar digital certificates; Mozilla and Google issue ‘death sentence’

    By Gregg Keizer

    SSL SecuredComputerworld – The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500, including ones for intelligence services like the CIA, the U.K.’s MI6 and Israel’s Mossad, a Mozilla developer said Sunday.

    The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at 531, said Gervase Markham, a Mozilla developer who is part of the team that has been working to modify Firefox to blocks all sites signed with the purloined certificates.

    Among the affected domains, said Markham, are those for the CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter and Microsoft’s Windows Update service.

    “Now that someone (presumably from Iran) has obtained a legit HTTPS cert for CIA.gov, I wonder if the US gov will pay attention to this mess,” Christopher Soghoian, a Washington D.C.-based researcher noted for his work on online privacy, said in a tweet Saturday.

    Soghoian was referring to assumptions by many experts that Iranian hackers, perhaps supported by that country’s government, were behind the attack. Google has pointed fingers at Iran, saying that attacks using an ill-gotten certificate for google.com had targeted Iranian users.

    All the certificates were issued by DigiNotar, a Dutch issuing firm that last week admitted its network had been hacked in July.

    The company claimed that it had revoked all the fraudulent certificates, but then realized it had overlooked one that could be used to impersonate any Google service, including Gmail. DigiNotar went public only after users reported their findings to Google.

    Criminals or governments could use the stolen certificates to conduct “man-in-the-middle” attacks, tricking users into thinking they were at a legitimate site when in fact their communications were being secretly intercepted.

    Google and Mozilla said this weekend that they would permanently block all the digital certificates issued by DigiNotar, including those used by the Dutch government.

    Their decisions come less than a week after Google, Mozilla and Microsoft all revoked more than 200 SSL (secure socket layer) certificates for use in their browsers, but left untouched hundreds more, many of which were used by the Dutch government to secure its websites.

    “Based on the findings and decision of the Dutch government, as well as conversations with other browser makers, we have decided to reject all of the Certificate Authorities operated by DigiNotar,” Heather Adkins, an information security manager for Google, said in a Saturday blog post.

    Johnathan Nightingale, director of Firefox engineering, echoed that late on Friday.

    “All DigiNotar certificates will be untrusted by Mozilla products,” said Nightingale, who also said that the Dutch government had reversed its position of last week — when it had asked browser makers to exempt its DigiNotar certificates.

    “The Dutch government has since audited DigiNotar’s performance and rescinded this assessment,” Nightingale said. “This is not a temporary suspension, it is a complete removal from our trusted root program.”

    On Saturday, Piet Hein Donner, the Netherlands’s Minister of the Interior, said the government could not guarantee the security of its websites because of the DigiNotar hack, and told citizens not to log into its sites until new certificates had been obtained from other sources.

    The DigiNotar breach is being audited by Fox-IT, which told the Dutch government that it was likely certificates for its sites had been fraudulently acquired by hackers.

    Several security researchers said the move by browser makers puts an end to DigiNotar’s certificate business.

    “Effectively a death sentence for DigiNotar,” said Jeremiah Grossman, CTO of WhiteHat Security, in a Friday tweet.

    Mozilla was scathing in its criticism of DigiNotar.

    Nightingale ticked off the missteps that led Mozilla to permanently block all sites signed with the company’s certificates, including DigiNotar’s failure to notify browser vendors in July and its inability to tell how many certificates had been illegally obtained. “[And] the attack is not theoretical,” Nightingale added. “We have received multiple reports of these certificates being used in the wild.”

    Markham went into greater detail on the hack and its ramifications. “It has now emerged that DigiNotar had not noticed the full extent of the compromise,” said Markham in a Saturday post to his personal blog. “The attackers had managed to hide the traces of the misissuance — perhaps by corrupting log files.”

    Because the Google certificate that prompted DigiNotar to acknowledge the intrusion was obtained before most of the others, Markham speculated that there had actually been two separate attacks, perhaps by different groups.

    “It is at least possible (but entirely speculative) that an initial competent attacker has had access to [DigiNotar’s] systems for an unknown amount of time, and a second attacker gained access more recently and their less-subtle, bull-in-a-china shop approach in issuing the [hundreds of] certificates triggered the alarms,” he said.

    Last week, Helsinki-based antivirus company F-Secure said it had found signs that DigiNotar’s network had been compromised as early as May 2009.

    Mozilla will update Firefox 6 and Firefox 3.6 on Tuesday to permanently block all DigiNotar-issued certificates, including those used by the Dutch government.

    On Saturday Google updated Chrome to do the same.

    Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at  @gkeizer, on Google+ or subscribe to Gregg’s RSS feed . His e-mail address is [email protected].

    www.computerworld.com, 4 September 2011

  • Full text of a CIA document indicating UK role in rendition of a terror suspect

    Full text of a CIA document indicating UK role in rendition of a terror suspect

    renditionWe are aware that your service has been cooperating with the British to effect Abu Munthir’s removal to Tripoli’

    “Our service has become aware that last weekend LIFG deputy Emir Abu Munthir and his spouse and children were being held in Hong Kong detention for immigration/passport violations. We are also aware that your service has been cooperating with the British to effect Abu Munthir’s removal to Tripoli, and that you had an aircraft available for this purpose in the Maldives.

    Our understanding is that the Hong Kong special wing (SW) originally denied permission for your aircraft to land in Hong Kong to enable you to assume control of Abu Munthir and his family. However, we believe that the reason for the refusal was based on international concerns over having a Libyan-registered aircraft land in Hong Kong. Accordingly, if your government were to charter a foreign aircraft from a third country, the Hong Kong government may be able to coordinate with you to render Abu Munthir and his family into your custody.

    If payment of a charter aircraft is an issue, our service would be willing to assist financially to help underwrite those costs. Please be advised that if we pursue that option, we must have assurances from your government that Abu Munthir and his family will be treated humanely and that his human rights will be respected; we must receive such assurances prior to any assistance being provided.

    For your information, the Hong Kong special administrative region is governed by a variety of legal constraints regarding deportation and custody of aliens. Accordingly, we believe that you will need to provide significant detail on Abu Munthir (eg, his terrorist/criminal acts, why he is wanted, perhaps proof of citizenship). It is also our understanding that Hong Kong officials have insisted that prior to turning Abu Munthir over to your custody, they must receive clear assurances from your government that Abu Munthir and his family will be treated humanely and in accordance with human rights.”

    guardian.co.uk, 4 September 2011